Remote Workers Duck Security Rules

Remote Workers Duck Security Rules

More than half of employees who work remotely are deliberately ignoring or working around security policies put in place by their company, according to new research.  The insider threat was unearthed during a recent survey of IT and cybersecurity professionals across industries conducted by identity platform Axiad when putting together its 2021 Remote Workforce Security Report. Researchers found that 52% of tech leaders reported that their remote employees had found workarounds to their company’s security policies. “Employees were…

Read More

What to Know About Application Modernization with Cloud

What to Know About Application Modernization with Cloud

When you’re considering cloud for your workloads and apps—and even more detailed, matching your apps with the right cloud—how do you choose? Cloud computing offers a ton of benefits, but not all cloud environments are created equal. As we continue to see businesses adopting multi-cloud computing, which includes leaving some apps on-prem or in edge locations, it’s important to build a cloud strategy that takes into account the web of applications you’re likely managing. We’ve…

Read More

What to Know About Application Modernization with Cloud

What to Know About Application Modernization with Cloud

When you’re considering cloud for your workloads and apps—and even more detailed, matching your apps with the right cloud—how do you choose? Cloud computing offers a ton of benefits, but not all cloud environments are created equal. As we continue to see businesses adopting multi-cloud computing, which includes leaving some apps on-prem or in edge locations, it’s important to build a cloud strategy that takes into account the web of applications you’re likely managing. We’ve…

Read More

Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks

Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks

The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. The Australian Cyber Security Centre (ACSC) warns of an escalation in LockBit 2.0 ransomware attacks against Australian organizations in multiple industry sectors starting July 2021. The Australian agency also published 2021-006: ACSC Ransomware Profile – Lockbit 2.0 which includes info related to the activity of the gang, such as initial access, threat activity and mitigations. “The ACSC has received reporting…

Read More

Back-to-Basics: Use Strong Encryption

Back-to-Basics: Use Strong Encryption

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

Working around a memory leak in Cisco Cat 9000 switches

Working around a memory leak in Cisco Cat 9000 switches

Cisco Catalyst 9000 Series switches have become the switch of choice for many enterprises, including the environment that I work in, where Cisco Catalyst 9300 24- and 48-port switches running Gibraltar-16.12.3 code had become the standard for the access layer when more than 12 ports were needed. That was about two years ago, and a year or so after that we began receiving notifications from an onsite location that there were intermittent network outages and…

Read More

Extreme targets SD-WAN services with Ipanema buy

Extreme targets SD-WAN services with Ipanema buy

With an eye toward reinforcing its cloud management business, Extreme Networks said it will acquire Ipanema’s SD-WAN business for about $73 million in cash. Ipanema and its SD-WAN business has been owned by France-based network orchestration firm Infovista since 2015 and has approximately 400 customers, mostly in Europe. Its cloud-managed SD-WAN platform is designed to deliver different workloads and applications securely across conventional wide-area networks and multicloud service providers, according to the company. Ipanema’s technology…

Read More

How to reduce your organization’s security risk in 6 steps

How to reduce your organization’s security risk in 6 steps

It’s impossible to guarantee security—but nearly all organizations should take these actions to protect organizational data and systems. Image: Andy Wolber/TechRepublic “During the meeting, [name withheld] said their organization was hacked. Is there anything we should all do?” the email said. Apparently, unauthorized access to an email account allowed a thief to make a financial account transfer that resulted in the loss of tens of thousands of dollars. Larger companies often reduce risk by hiring…

Read More

Healthcare organizations are a focus of ransomware attacks – Cisco Blogs

Healthcare organizations are a focus of ransomware attacks – Cisco Blogs

The adoption of electronic health records (EHRs) and even faster adoption of wireless medical devices and telemedicine has made patient information more accessible by more people. Over the past year and a half that’s been tremendously beneficial. The shift to remote care and the widespread adoption of EHR solutions by health systems have shaped digital transformation in healthcare. The challenge now is to understand how hospitals and care centers expect to protect patient information and…

Read More

As-a-service may be more than you think – Cisco Blogs

As-a-service may be more than you think – Cisco Blogs

As-a-service models gain momentum “As-a-service” (aaS) models continue gaining momentum throughout the technology stack. They certainly aren’t a new way to consume technology. SaaS (software-as-a-service) began over two decades ago with the launch of WebEx in 1995 and Salesforce.com followed in 1999.  Cisco jumped all in on SaaS ourselves, acquiring WebEx back in 2007. It was 11 years after the Webex SaaS model to AWS launching its first-generation IaaS (infrastructure-as-a-service), EC2 in 2006, with Google…

Read More
1 3,527 3,528 3,529 3,530 3,531 4,177